Android Market, a threat to your smartphone security! | Part I
Your Gmail account can be a key for a hacker to unlock your personal details on your android smartphone. Yes, It is that simple, easy and unfortunately true!
The latest version of newly launched android market enables you to remotely install application on your smartphone. Now, this seems to be exciting! You have an android phone, a Gmail account associated to it.
All you have to do is to open your web browser on your desktop, enter the android marker (market.android.com) and log in using your Google account. Select your favorite application and click install. The market will recognize the phone against your account and enlist the services to which the app will have access to. As soon as you agree and click “Install ”, the application will automatically start installing on your android phone (provided it is connected to the internet). You are done with remote installing the app from android market! (The entire process is illustrated)
But wait! This can be a serious security threat. Any hacker who gains unauthorized access to your Gmail account can purchase and install applications from the market to your phone remotely. As the phone does not reconfirm the installation of app and installs itself, you might not even get to know about any application remotely installed. This means that your Smartphone’s data (contacts, messages, files, documents etc.) and calls are at risk but the attacker can even find the location of victim. The German Federal Office for Information Security (BSI) is greatly concerned with the increasing attacks on mobile devices. BSI head Michael Hange states: “Just on the basis of their increasing popularity and proliferation, mobile devices are an attractive target for criminals.” With nearly countless applications in the market today, tablets, smartphones and other mobile devices have become a vulnerable target for attackers. Kaspersky has criticized this security threat owing to the new android market’s remote installation feature in its blog.
But does this hypothetical attack really make a practical sense or it is simply fictitious story? Stay tuned to the post.
To be continued
Like us on Facebook
This week Top Posts
- Top Things To Do After Installing Ubuntu 13.10 'Saucy Salamander' : Ubuntu 13.10 Saucy Salamander will be released on coming October 17th with many new salient featur...0 comments |
- Configure Your Browser To Use Tor On Ubuntu/Debian/Linux Mint : Tor, The Onion Router, is a network of Virtual Tunnels that allows users to communicate securely and...2 comments |
- Setup A Full Featured ITIL Management System Using Integria IMS On CentOS 6 : Integria IMS is a fully featured ITIL management system, featuring a ticketing system, inventory/C...2 comments |
- How To Upgrade From Ubuntu 13.04 Raring To Ubuntu 13.10 Saucy Salamander : Ubuntu 13.10 Saucy will be released on October 17th. Hope it will come with lot of improvements and ...0 comments |
- Install lamp with 1 command in Ubuntu 12.10, 13.04 Raring Ringtail & LinuxMint13 : Updated: 10/09/2012 :LAMP (Linux, Apache, MySQL and PHP) is an open source Web development platform ...0 comments |
- Install and Configure Samba share in Ubuntu 13.10 'Saucy Salamander' , 13.04| Howto : Updated 05-04-2013: One of the most asked features for Samba is a graphical user interface to help w...0 comments |
- Configure Your Browser To Use Tor On Ubuntu/Debian/Linux Mint
- Setup A Full Featured ITIL Management System Using Integria IMS On CentOS 6
- Install LibreOffice 4.1.3 in Elementary OS ‘Luna’
- How To Install Simple Scan in Crunchbang ‘Waldorf’
- Selene Media Encoder: Convert Audio, Video Files To Most Popular Formats
- Linux Kernel 3.12.2 Is Available For Download! Install / Upgrade Instructions
- CentOS 6.5 Has Been Officially Released!
- Format Junkie: Convert Media Files To All Popular Formats
- Setup Squid Proxy Server On openSUSE 13.1
- TimeShift: Restore Your Linux Desktop To Previous State
This work by unixmen.com is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Copyright © 2008-2013 Unixmen.com .